The Darknet: a Digital Copyright Revolution, 16 Rich

Total Page:16

File Type:pdf, Size:1020Kb

The Darknet: a Digital Copyright Revolution, 16 Rich Richmond Journal of Law and Technology Volume 16 | Issue 4 Article 4 2010 The aD rknet: A Digital Copyright Revolution Jessica A. Wood Follow this and additional works at: http://scholarship.richmond.edu/jolt Part of the Computer Law Commons, Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Jessica A. Wood, The Darknet: A Digital Copyright Revolution, 16 Rich. J.L. & Tech 14 (2010). Available at: http://scholarship.richmond.edu/jolt/vol16/iss4/4 This Article is brought to you for free and open access by UR Scholarship Repository. It has been accepted for inclusion in Richmond Journal of Law and Technology by an authorized administrator of UR Scholarship Repository. For more information, please contact [email protected]. Richmond Journal of Law & Technology Volume XVI, Issue 4 THE DARKNET: A DIGITAL COPYRIGHT REVOLUTION By Jessica A. Wood* Cite as: Jessica Wood, The Darknet: A Digital Copyright Revolution, XVI Rich. J.L. & Tech. 14 (2010), http://jolt.richmond.edu/v16i4/article14.pdf. Introduction [1] We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture.1 Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media.2 These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.”3 The Darknet has been called the public’s great equalizing force in the digital millennium, because it will serve as “a counterbalancing force and bulwark to * Southern California attorney, entrepreneur and digital native. J.D., University of California, Hastings College of the Law; B.A., University of California, Berkeley. I would like to thank Professors Margreth Barrett, Robin Feldman and Jeffrey Lefstin for their guidance. Special thanks to my family, especially my parents, and friends for their support and encouragement. 1 See Chris Anderson, People Power, WIRED, July 2006, available at http://www.wired.com/ wired/archive/14.07/people html (last visited May 20, 2010). 2 See, e.g., About GNUnet, http://www.gnunet.org (last visited May 20, 2010). 3 J.D. Lasica, DARKNET: HOLLYWOOD’S WAR AGAINST THE DIGITAL GENERATION 264 (John Wiley & Sons, Inc. 2005). 1 Richmond Journal of Law & Technology Volume XVI, Issue 4 defend digital liberties” against forces lobbying for stronger copyrights and increased technological controls. 4 [2] This article proposes a digital use exception to existing copyright law to provide adequate compensation to authors while promoting technological innovation, and the creation and dissemination of new works. Although seemingly counterintuitive, content producers, publishers, and distributors wishing to profit from their creations must relinquish their control over digital media in order to survive the Darknet era. Absent a government-granted monopoly, free market forces will provide adequate incentives to producers to create quality works, and an efficient dissemination infrastructure will evolve. [3] Part I examines the prospect that, due to the Darknet, it is virtually impossible to control digital copying. Peer production is increasing and darknets are becoming more prevalent. Liability rules, stringent copyrights, and technological protection measures stifle innovation, smother creation, and force consumers further underground into darknets. The Darknet poses a particular threat because it is impossible to track or proscribe user behavior. Further, the presence of the Darknet will render technological protection measures unenforceable, or at least impracticable, as a solution for digital copyright management. Part II introduces a digital use exception for copyright to deter development of the Darknet. The proposed copyright shelter is the solution most closely aligned with the goals of copyright, and a monopoly is no longer necessary or practical to accomplish those goals in the digital realm. Part III explores methods by which content creators, publishers, and distributors can profit under this new rule. Absent copyrights for digital works, service providers will capitalize on alternative business methods and data mining. Driven by necessity, they will commission the production of new works. I. THE RISE OF THE DARKNET CHALLENGES DIGITAL COPYRIGHT ENFORCEMENT A. Peer Production and Distributed Networking 1. Digital Content Consumers Become Producers [4] Internet users no longer passively consume media. Today’s consumers actively participate, communicate, collaborate, and create a considerable amount 4 Id. 2 Richmond Journal of Law & Technology Volume XVI, Issue 4 of amateur content (often referred to as user-generated content or UGC).5 This new breed of producer-consumers, sometimes termed “prosumers,” embodies democratic culture.6 The digital revolution promises prosumers freedom to interact with media on their own terms.7 Not only do they choose what to watch, read, hear, or create, they dictate when, where, how, and with whom they will do so.8 [5] Amateur production on the Internet is growing in volume and sophistication9 with prosumers expressing themselves through blogs, videos, photos, music (original scores, mash-ups and remixes), personalized web pages, and software applications.10 Web 2.0, the newest generation of Internet development, provides the technology that facilitates prosumer participation: wikis, podcasting, news fora, social networking sites, hosting services, and search engines.11 Peer-to-peer (P2P) networking is arguably the most controversial of these technologies. Peer-to-peer networking is a natural companion to peer production because it provides an efficient distribution vehicle for digital media and allows near-perfect access to content.12 Since users communicate directly and 5 See, e.g., Press Release, Principles for User Generated Content Services, Internet and Media Industry Leaders Unveil Principles to Foster Online Innovation While Protecting Copyrights (Oct. 18, 2007), available at http://www.ugcprinciples.com/press_release html (last visited May 20, 2010). 6 ALVIN TOFFLER, THE THIRD WAVE 283 (William Morrow & Company 1980) (coining the term “prosumers”). 7 See id. 8 See LAWRENCE LESSIG, REMIX: MAKING ART AND COMMERCE THRIVE IN THE HYBRID ECONOMY 44 (Penguin Press 2008). 9 Johan A. Pouwelse et al., Pirates and Samaritans: a Decade of Measurements on Peer Production and Their Implications for Net Neutrality and Copyright, 32 TELECOMMS. POL’Y 701, 711 (2008) (detailing Dutch scientists’ findings from research that tracked P2P networking for ten years). 10 See, e.g., YouTube Home Page, http://www.youtube.com (last visited May 20, 2010); WordPress Home Page, http://wordpress.com (last visited May 20, 2010). 11 See Claudia K. Grinnell, From Consumer to Prosumer to Produser: Who Keeps Shifting My Paradigm? (We Do!), 21 PUB. CULTURE 577, 595 (2009). 12 Pouwelse et al., supra note 9, at 702. 3 Richmond Journal of Law & Technology Volume XVI, Issue 4 contribute both content and hardware resources, P2P replaces the traditional, central-server Internet model as the primary vehicle for content distribution. 13 2. Distributed Networking Technology [6] Peer-to-peer distribution technology differs from traditional Internet functioning by permitting computers to share information directly with other computers without the need for a central storage server. 14 Previously, computers connected to the Internet communicated with each other through servers using standard Protocol guidelines. 15 Internet Protocol (IP) addresses that identify each computer on the Internet can be converted to recognizable names (e.g., www.spacebook.com). 16 Typically, media files and other content are stored on central servers (hosts) in a traditional client/server relationship. 17 In that system, client (user) computers can only access information on servers through websites using the Internet, and clients cannot exchange files directly with other client computers. 18 In contrast, a P2P network permits a computer connected to the Internet to identify itself as both a client and a server, thereby enabling the computer to communicate directly with any other computer on the Internet to exchange files. 19 All types of P2P network models fall within the classification of distributed networks because no central server stores the files. 20 [7] In a distributed network, every computer acts as a host, and each user can introduce content to the network by storing files on their computer and making 13 Id. 14 Stephanos Androutsellis-Theotokis & Diomidis Spinellis, A Survey of Peer-to-Peer Content Distribution Technologies , 36 ACM COMPUTING SURVEYS 335, 335-36 (2004). 15 Grinnell, supra note 11, at 578. 16 BILL AVERY , SAN LUIS OBISPO PC USERS GROUP : GENERAL MEETING 2 (2002), http://www.slobytes.org/newsletter/nl1202.pdf. 17 David Barkai, An Introduction to Peer-to-Peer Computing , INTEL DEVELOPER MAG ., Feb. 2000, at 1, 3. 18 Id. 19 Id. 20 Androutsellis-Theotokis, supra note 14, at 337. 4 Richmond Journal of Law & Technology Volume XVI, Issue 4 those files available to others on the network. 21 The content available at any given moment depends on the contemporaneous files on the network users’ computers. 22 A software application is required to establish
Recommended publications
  • Emerging Cyber Threats to the United States Hearing
    EMERGING CYBER THREATS TO THE UNITED STATES HEARING BEFORE THE SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION FEBRUARY 25, 2016 Serial No. 114–55 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PUBLISHING OFFICE 21–527 PDF WASHINGTON : 2016 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas CANDICE S. MILLER, Michigan, Vice Chair JAMES R. LANGEVIN, Rhode Island JEFF DUNCAN, South Carolina BRIAN HIGGINS, New York TOM MARINO, Pennsylvania CEDRIC L. RICHMOND, Louisiana LOU BARLETTA, Pennsylvania WILLIAM R. KEATING, Massachusetts SCOTT PERRY, Pennsylvania DONALD M. PAYNE, JR., New Jersey CURT CLAWSON, Florida FILEMON VELA, Texas JOHN KATKO, New York BONNIE WATSON COLEMAN, New Jersey WILL HURD, Texas KATHLEEN M. RICE, New York EARL L. ‘‘BUDDY’’ CARTER, Georgia NORMA J. TORRES, California MARK WALKER, North Carolina BARRY LOUDERMILK, Georgia MARTHA MCSALLY, Arizona JOHN RATCLIFFE, Texas DANIEL M. DONOVAN, JR., New York BRENDAN P. SHIELDS, Staff Director JOAN V. O’HARA, General Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES JOHN RATCLIFFE, Texas, Chairman PETER T.
    [Show full text]
  • Combining Bittorrent with Darknets for P2P Privacy
    Combining Bittorrent with Darknets for P2P privacy Öznur Altintas Niclas Axelsson Abstract Over the last few years, traditional downloading of programs and application from a website has been replaced by another medium - peer to peer file sharing networks and programs. Peer- to-peer sharing has grown to tremendous level with many networks having more then millions of users to share softwareʼs, music files, videos and programs etc. However, this rapid growth leaves privacy concerns in its awake. P2P applications disable clients to limit the sharing of documents to a specific set of users and maintain their anonymity. Using P2P applications like BitTorrent exposes clientsʼ information to the other people. OneSwarm is designed to overcome this privacy problem. OneSwarm is a new P2P data sharing system that provides users with explicit, configurable control over their data. In this report, we will discuss briefly Darknets and privacy terms, and mainly how OneSwarm solves privacy problem while providing good performance. Introduction For a better understanding of this report, we begin with the explanation of some terms such as Darknets and privacy and brief background information underlies the idea of OneSwarm. Darknet—a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protocol layer riding on existing networks. Examples of Darknets are peer-to-peer file sharing, CD and DVD copying and key or password sharing on email and newsgroups. When used to describe a file sharing network, the term is often used as a synonym for "friend-to-friend", both describing networks where direct connections are only established between trusted friends.
    [Show full text]
  • The Internet Organised Crime Threat Assessment (IOCTA) 2015
    The Internet Organised Crime Threat Assessment (IOCTA) 2015 2 THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015 THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015 3 TABLE OF FOREWORD 5 CONTENTS ABBREVIATIONS 6 EXECUTIVE SUMMARY 7 KEY FINDINGS 10 KEY RECOMMENDATIONS 12 SUGGESTED OPERATIONAL PRIORITIES 15 INTRODUCTION 16 MALWARE 18 ONLINE CHILD SEXUAL EXPLOITATION 29 PAYMENT FRAUD 33 SOCIAL ENGINEERING 37 DATA BREACHES AND NETWORK ATTACKS 40 ATTACKS ON CRITICAL INFRASTRUCTURE 44 CRIMINAL FINANCES ONLINE 46 CRIMINAL COMMUNICATIONS ONLINE 50 DARKNETS 52 BIG DATA, IOT AND THE CLOUD 54 THE GEOGRAPHICAL DISTRIBUTION OF CYBERCRIME 57 GENERAL OBSERVATIONS 62 APPENDICES 67 A1. THE ENCRYPTION DEBATE 67 A2. AN UPDATE ON CYBER LEGISLATION 70 A3. COMPUTER CRIME, FOLLOWED BY CYBERCRIME FOLLOWED BY …. ROBOT AND AI CRIME? 72 4 THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015 FOREWORD These include concrete actions under the three main mandated Threat Assessment (IOCTA), the annual presentation of the areas – child sexual exploitation, cyber attacks, and payment I am pleased to present the 2015 Internet Organised Crime fraud – such as targeting certain key services and products Centre (EC3). offered as part of the Crime-as-a-Service model, addressing the cybercrime threat landscape by Europol’s European Cybercrime growing phenomenon of live-streaming of on-demand abuse of children, or targeted actions with relevant private sector partners ofUsing cybercrime the 2014 for report the asperiod a baseline, under this consideration. assessment Itcovers offers the a cross-cutting crime enablers such as bulletproof hosting, illegal viewkey developments, predominantly changes from a lawand enforcement emerging threats perspective in the based field tradingagainst onlinesites on payment Darknets fraud.
    [Show full text]
  • Machine-To-Machine Communication in Rural Conditions: Realizing Kasadakanet
    Machine-to-machine communication in rural conditions: Realizing KasadakaNet Fahad Ali VU Amsterdam [email protected] Supervised by Victor de Boer ABSTRACT the explored concepts is using Semantic Web technologies Contextual constraints play an important role in ICT for De- to facilitate knowledge sharing in rural areas (Gu´eret et al., velopment (ICT4D) projects. These ICT4D projects include 2011). those whose goal is to enable information and knowledge sharing in rural areas while keeping constraints such as lack One of the resulting products that came out of this research of electricity and technological infrastructure or (technical) is the Kasadaka2, a low-resource Raspberry Pi-based device illiteracy of end-users in mind. The Kasadaka project offers that provides an infrastructure on which voice-based appli- a solution for locals in rural areas in Sub-Saharan Africa to cations can be built and deployed locally. These applica- share knowledge. Due to a lack of technological infrastruc- tions for the Kasadaka are usually custom-built for specific ture, networks and internet connections are often not avail- needs and use cases. New applications can also be created able. Therefore, many ICT implementations in those areas fairly easily, making the platform ideal for rapid prototyping are not able to share data among each other. This paper (Baart, 2016). Essentially, these Kasadaka's are deployed on explores the possibilities of a machine to machine communi- a one-per-village basis, giving each village access to its own cation method to enable information sharing between geo- little piece of technology that facilitates local information graphically distributed devices.
    [Show full text]
  • Darknet As a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks
    Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks Claude Fachkha A Thesis in The Department of Electrical and Computer Engineering Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy at Concordia University Montreal, Quebec, Canada November 2015 c Claude Fachkha, 2015 CONCORDIA UNIVERSITY SCHOOL OF GRADUATE STUDIES This is to certify that the thesis prepared By: Claude Fachkha Darknet as a Source of Cyber Threat Intelligence: Entitled: Investigating Distributed and Reflection Denial of Service Attacks and submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy complies with the regulations of the University and meets the accepted standards with respect to originality and quality. Signed by the final examining committee: 'U'HERUDK'\VDUW*DOH Chair 'U0RKDPPDG=XONHUQLQH External Examiner 'U-RH\3DTXHW External to Program 'U5DFKLGD'VVRXOL Examiner 'U5RFK+*OLWKR Examiner 'U0RXUDG'HEEDEL Thesis Supervisor Approved by 'U$EGHO5D]LN6HEDN Chair of Department or Graduate Program Director 'U$PLU$VLI Dean of Faculty ABSTRACT Cyberspace has become a massive battlefield between computer criminals and com- puter security experts. In addition, large-scale cyber attacks have enormously ma- tured and became capable to generate, in a prompt manner, significant interruptions and damage to Internet resources and infrastructure. Denial of Service (DoS) attacks are perhaps the most prominent and severe types of such large-scale cyber attacks. Furthermore, the existence of widely available encryption and anonymity techniques greatly increases the difficulty of the surveillance and investigation of cyber attacks. In this context, the availability of relevant cyber monitoring is of paramount im- portance.
    [Show full text]
  • Unveiling the I2P Web Structure: a Connectivity Analysis
    Unveiling the I2P web structure: a connectivity analysis Roberto Magan-Carri´ on,´ Alberto Abellan-Galera,´ Gabriel Macia-Fern´ andez´ and Pedro Garc´ıa-Teodoro Network Engineering & Security Group Dpt. of Signal Theory, Telematics and Communications - CITIC University of Granada - Spain Email: [email protected], [email protected], [email protected], [email protected] Abstract—Web is a primary and essential service to share the literature have analyzed the content and services offered information among users and organizations at present all over through this kind of technologies [6], [7], [2], as well as the world. Despite the current significance of such a kind of other relevant aspects like site popularity [8], topology and traffic on the Internet, the so-called Surface Web traffic has been estimated in just about 5% of the total. The rest of the dimensions [9], or classifying network traffic and darknet volume of this type of traffic corresponds to the portion of applications [10], [11], [12], [13], [14]. Web known as Deep Web. These contents are not accessible Two of the most popular darknets at present are The Onion by search engines because they are authentication protected Router (TOR; https://www.torproject.org/) and The Invisible contents or pages that are only reachable through the well Internet Project (I2P;https://geti2p.net/en/). This paper is fo- known as darknets. To browse through darknets websites special authorization or specific software and configurations are needed. cused on exploring and investigating the contents and structure Despite TOR is the most used darknet nowadays, there are of the websites in I2P, the so-called eepsites.
    [Show full text]
  • Networks & Communications
    PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Objectives 1. Discuss the importance of computer networks. 2. Compare different types of LANs and WANs. 3. List and describe the hardware used in both wired and wireless networks. 4. List and describe the software and protocols used in both wired and wireless networks. 5. Explain how to protect a network. Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Objective 1: Overview From Sneakernet to Hotspots 1. Define computer network and network resources 2. Discuss the importance of computer networks 3. Differentiate between peer-to-peer networks and client-server networks Key Terms § Client § Peer-to-peer network § Client-server network § Server § Computer network § Workgroup § Homegroup § Network resource Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Networks § Computer network § Network resources § Two or more § Software computers § Hardware § Share resources § Files § Save time § Save money § Increase productivity § Homegroup § Simple networking feature § Used to network a group of Windows computers Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Network Types § Peer-to-peer (P2P) § Each computer is equal § Client-server network § At least one central server Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Network Types Peer-to-Peer (P2P) § Each device can share resources § No centralized authority § Each computer belongs to workgroup § Do not need to connect to the Internet § Most found in homes and small businesses § Simplest type of network § Do not need network operating system § All computers must be on to access resources Visualizing Technology Copyright © 2014 Pearson Educaon, Inc.
    [Show full text]
  • Pirate Philosophy Leonardo Roger F
    Pirate Philosophy Leonardo Roger F. Malina, Executive Editor Sean Cubitt, Editor-in-Chief Closer: Performance, Technologies, Phenomenology , Susan Kozel, 2007 Video: The Reflexive Medium , Yvonne Spielmann, 2007 Software Studies: A Lexicon , Matthew Fuller, 2008 Tactical Biopolitics: Art, Activism, and Technoscience , edited by Beatriz da Costa and Kavita Philip, 2008 White Heat and Cold Logic: British Computer Art 1960–1980 , edited by Paul Brown, Charlie Gere, Nicholas Lambert, and Catherine Mason, 2008 Rethinking Curating: Art after New Media , Beryl Graham and Sarah Cook, 2010 Green Light: Toward an Art of Evolution , George Gessert, 2010 Enfoldment and Infinity: An Islamic Genealogy of New Media Art , Laura U. Marks, 2010 Synthetics: Aspects of Art & Technology in Australia, 1956–1975 , Stephen Jones, 2011 Hybrid Cultures: Japanese Media Arts in Dialogue with the West , Yvonne Spielmann, 2012 Walking and Mapping: Artists as Cartographers , Karen O’Rourke, 2013 The Fourth Dimension and Non-Euclidean Geometry in Modern Art, revised edition , Linda Dalrymple Henderson, 2013 Illusions in Motion: Media Archaeology of the Moving Panorama and Related Spectacles , Erkki Huhtamo, 2013 Relive: Media Art Histories , edited by Sean Cubitt and Paul Thomas, 2013 Re-collection: Art, New Media, and Social Memory , Richard Rinehart and Jon Ippolito, 2014 Biopolitical Screens: Image, Power, and the Neoliberal Brain , Pasi Väliaho, 2014 The Practice of Light: A Genealogy of Visual Technologies from Prints to Pixels , Sean Cubitt, 2014 The Tone of Our Times: Sound, Sense, Economy, and Ecology , Frances Dyson, 2014 The Experience Machine: Stan VanDerBeek’s Movie-Drome and Expanded Cinema , Gloria Sutton, 2014 Hanan al-Cinema: Affections for the Moving Image , Laura U.
    [Show full text]
  • Sneakernet on Wheels: Trustworthy NFC-Based Robot to Machine Communication
    Sneakernet on Wheels: Trustworthy NFC-based Robot to Machine Communication Thomas Ulz, Thomas Pieber, Christian Steger Sarah Haas, Rainer Matischek Institute for Technical Informatics Development Center Graz Graz University of Technology Infineon Technologies Austria AG Graz, Austria Graz, Austria fthomas.ulz, thomas.pieber, [email protected] fsarah.haas, rainer.matischekg@infineon.com Abstract—Wireless communication technologies such as WiFi, controlled accessories could potentially operate in the ZigBee, or Bluetooth often suffer from interference due to many 2:4 GHz range [3]. The alternative 5 GHz range for WiFi devices using the same, unregulated frequency spectrum. Also, is also already used by other devices such as cordless wireless coverage can be insufficient in certain areas of a building. At the same time, eavesdropping a wireless communication out- phones, radar, and digital satellites [4]. Due to many de- side a building might be easy due to the extended communication vices operating in the same frequency range, interference range of particular technologies. These issues affect mobile robots will occur and affect wireless communication. and especially industrial mobile robots since the production 2) Insufficient Coverage: Due to certain objects in build- process relies on dependable and trustworthy communication. ings that dampen or even shield wireless communication Therefore, we present an alternative communication approach that uses Near Field Communication (NFC) to transfer confiden- (e.g. walls or large production machines) it is costly tial data such as production-relevant information or configuration to provide good wireless coverage for every part of updates. Due to NFC lacking security mechanisms, we propose a certain area. For IAMRs this is a problem due to a secured communication framework that is supported by dedi- the non-deterministic behavior when navigating on a cated hardware-based secure elements.
    [Show full text]
  • Bitcoin 2: Freedom of Transaction
    Bitcoin 2: Freedom of Transaction Sid Angeles and Eric Gonzalez [email protected] AF76 05E5 EB15 2B00 AB18 204C 11C9 1C8B EA6C 7389 [email protected] 3A85 7ABC 9453 96E4 B9DB 2A11 7370 E15E 8F60 2788 Donations: 1btctwojvohHSLaXaJAHWebZF2RS8n1NB Revision 2 July 23, 2013 Abstract We propose a set of changes to the original Bitcoin protocol (called Bitcoin 2) that allows Bitcoin to evolve into a system that is future-proof against developing threats to its original vision – an alternative, decentralized payment system which allows censorship-resistant, irreversible transac- tions. Bitcoin 2 strives to be a minimal set that lays the foundations for a long-lived system capable of delivering the original Bitcoin vision, with enough room for growth to layer additional im- provements on top of it. These changes include a sliding blockchain with fixed block sizes, the redistribution of dead coins with an unforgeable lottery, enforced mixing, and miner ostracism. The proposed changes require a proactive fork of the original Bitcoin block chain, but they allow final transfers of existing coins into Bitcoin 2 and a reuse of the existing Bitcoin infrastruc- ture. 1 Introduction The Bitcoin peer-to-peer electronic cash system [11] was introduced in 2009 and it proved to be a remarkable piece of work which found widespread adoption. The system was started with the explicit goal of providing a completely alternative payment system without a single point of failure that allows anonymous, but not untraceable, transactions. However, certain shortcomings in the original protocol and unforeseen developments inside and outside of the growing Bitcoin ecosystem threaten these very goals and there is good reason to believe that Bitcoin could develop into a system that is a complete perversion of the original vision – a com- pletely transparent payment system with very few points of control which has been totally absorbed by the established financial and regulatory environment.
    [Show full text]
  • Terabyte Sneakernet: the Carry-On Data Center by Drew Hamre
    December 2007 Terabyte SneakerNet: The Carry-on Data Center By Drew Hamre I recently helped relocate a data center for a US government agency, moving system images from Virginia to a consolidated facility in Minnesota. During ‘cutover’ weekend, production systems in Virginia were dropped and remained unavailable until data could be refreshed at the Minnesota data center and the new systems could be brought online. To minimize downtime, the time allotted for refreshing data across locations was extremely brief. email This data transfer was daunting for two reasons: the amount of data being moved was large (as much as two-terabytes would be moved during cutover weekend), and the network between the two sites was slow. Portable media were the only viable alternative, but these devices would need to meet extremely difficult requirements. They would need to be fast (due to the brief transfer window), inexpensive (no hardware funds were budgeted) and portable (devices needed to be hand-carried by agents to meet security mandates). Ideally, the team needed to find fast, cheap transfer devices that could be stowed in an airliner’s overhead bin. This paper reviews alternatives for the transfer, focusing on the latest generation of commodity Network Attached Storage (NAS) devices that allowed agents to transfer as much as 12-terabytes in a single carry-on duffle bag. Background: Transitioning Data Centers At the time of the transition, both data centers were fully functional: Virginia supported production, while Minnesota (a parallel environment running pre-staged system images on new hardware) supported acceptance testing. Minnesota’s parallel environment included a full snapshot of Virginia’s file system and databases (roughly 10-terabytes in total).
    [Show full text]
  • Bittorrent Darknets Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu and Keith W
    BitTorrent Darknets Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu and Keith W. Ross Woonhak Kang 2010. 11. 04 VLDB Lab. [email protected] Contents • Introduction • BitTorrent (Background) § Architecture and Term. § Public and Private torrent sites • Overview of BitTorrent Darknets Operation • Analysis § Macroscopic § Medium-scopic § Microscopic • Conclusion 2 SKKU VLDB Lab. Introduction • Darknet § 비공개 토런트 사이트(private torrent sites) § 가입자에게만 공개 § 초대(inviatation), 사이트 임시 가입기간에 가입 § 사용자의 upload, download 크기를 기록 - up/down 비율을 통해 사용자의 이용제한 - up/down 비율이 높은 유저에게 혜택 • Motivation § 연구분야에서 큰 주목을 받지 못했다. § 독특한 정책 때문에 공개 토런트와 특성이 다르다. § 토런트 전체 시스템의 이해를 위해서는 공개/비공개 모두를 고려할 필요 가 있다 3 SKKU VLDB Lab. Introduction • Analysis § Macroscopic - 800개 이상의 비공개 토런트 분석 - Sharky list 와 Alexa rank 이용 - 전체 토런트 파일, 유저, 피어(peer) 정보 분석 § Medium-scopic - 4개의 인기 비공개 토런트 분석 - 트랙커(trackers), 피어(peer), 유저, 실제 공유파일 분석 - 공개 사이트와 비공개 사이트간의 상관관계 § Microscopic - HDChina 분석 - 유저의 up/down 기록, 활동시간 조사 4 SKKU VLDB Lab. Contents • Introduction • BitTorrent (Background) § Architecture and Term. § Public and Private torrent sites • Overview of BitTorrent Darknets Operation • Analysis § Macroscopic § Medium-scopic § Microscopic • Conclusion 5 SKKU VLDB Lab. BitTorrent (Background) • Bittorrent is a system for efficient and scalable replication of large amounts of static data § Scalable - the throughput increases with the number of downloaders § Efficient - it utilises a large amount of available network bandwidth • The file to be distributed is split up in pieces and an SHA-1 hash is calculated for each piece 6 SKKU VLDB Lab. BitTorrent (Background) • A metadata file (.torrent) is distributed to all peers § Usually via HTTP • The metadata contains: § The SHA-1 hashes of all pieces § A mapping of the pieces to files § trackers reference 7 SKKU VLDB Lab.
    [Show full text]